SOC ANALYST (Enterprise Transformation Consultant) –
This is a full-time, permanent position with our client, a growing cyber security professional services organization. Must be able to work in New York City a couple of days per week.
Required Skills / Experience
Experience working in a Security Operations Center (SOC) or similar enterprise security position, or providing consulting services to support the design and development of cyber defense security functions.
Must be self-motivated and able to work both independently and as part of a team.
Previous experience designing and developing processes and procedures to include analyst workflows, run books, play books, etc.
Experience working across organizational lines of business to implement mitigations, remediation, and countermeasures resulting from cyber threat intrusions.
Practical experience and knowledge of various network and system security technologies to include SIEM, data analytics platforms, end-point tools, network technologies and appliances.
Previous experience leading technical projects and ensuring documented requirements are delivered with excellence.
Previous experience working with, designing, implementing, and operating knowledge management and/or cyber threat intelligence systems.
Previous experience developing and designing custom metrics packages disseminated to senior and executive leadership teams.
Knowledge of industry recognized analysis frameworks (Diamond Model, NIST Incident Response, Kill Chain, etc.).
Strong verbal and written communication and client intimacy skills with experience briefing corporate executives and professionals.
Bachelor’s Degree in an IT related field and/or equivalent work experience.
Relevant certifications (CISSP, CEH, GCIH, GCFE, etc.).
Previous experience providing consulting services to Fortune/Global 1000 clients.
Previous experience designing, organizing, and executing security table top exercises and training workshops.
Hands on experience working with Incident Response, Threat Monitoring, and Cyber Threat Intelligence functions.
Previous experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents.
Previous experience executing cyber security assessments and developing strategic implementation plans to improve and advance organizational cyber security capabilities.
Previous experience working with various SIEM technologies to include Splunk ES, IBM QRadar, HP ArcSight, and/or McAfee Nitro.
Previous experience working within Operational Technology (OT) Networks to include Integrated Controls Systems (ICS), SCADA, and Process Control Networks (PCN).
Previous experience developing proposals, statements of work, and general content to support business capture.
Previous experience with Business and/or Organizational Change Management.
Master’s Degree in an IT related field.